Follow us
Click to Subscribe
Home
Subscribe
Deals
Home
Data Breaches
Cyber Attacks
Vulnerabilities
Malware
Deals
Contact
The Hacker News - Cybersecurity News and Analysis: Spear Phishing
New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks
November 14, 2019
Swati Khandelwal
Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and ...
GandCrab ransomware and Ursnif virus spreading via MS Word macros
January 25, 2019
Swati Khandelwal
Security researchers have discovered two separate malware campaigns, one of which is distributing the Ursnif data-stealing trojan and th...
U.S. Trade Group Hacked by Chinese Hackers ahead of Trump-Xi Trade Summit
April 06, 2017
Swati Khandelwal
Researchers have uncovered a Chinese cyber-espionage against the United States ahead of the trade summit on Thursday between US President...
Yahoo! Hack! How It Took Just One-Click to Execute Biggest Data Breach in History
March 16, 2017
Swati Khandelwal
In the digital world, it just takes one click to get the keys to the kingdom. Do you know spear-phishing was the only secret weapon behind...
FBI Most Wanted — Three 'Syrian Electronic Army' Hackers Charged for Cyber Crime
March 23, 2016
Mohit Kumar
Syrian Electronic Army (SEA) Hackers have made their place on the FBI's Most Wanted List. The US Department of Justice and the ...
FBI Director says 'Sloppy' Sony Hackers Left Clues that Point to North Korea
January 08, 2015
Swati Khandelwal
The hackers group responsible for the last year's largest hacking attack on Sony Pictures Entertainment left many clues which proves tha...
New BlackEnergy Crimeware Enhanced to Target Linux Systems and Cisco Routers
November 05, 2014
Swati Khandelwal
Security researchers at Kaspersky Lab have unearthed new capabilities in the BlackEnergy Crimeware weapon that has now ability to hack...
Microsoft Windows Zero-Day Vulnerability "CVE-2014-4114" Used to Hack NATO
October 14, 2014
Swati Khandelwal
Once again a Russian cyber espionage group has gained media attention by exploiting a Zero-day vulnerability in Microsoft's Windows ope...
WinRAR File Extension Spoofing vulnerability allows Hackers to Hide Malware
April 02, 2014
Mohit Kumar
Imagine, You Open a Winrar archive of MP3 files, but what if it will install a malware into your system when you play anyone of them. ...
Malaysian flight MH370 tragedy abused by Chinese hackers for Espionage attacks
March 26, 2014
Wang Wei
The Mysterious Malaysian Airlines flight MH370 , a Boeing 777-200 aircraft that has gone missing by the time it flew from Kuala Lumpur t...
Windows Spy tool equipped with Android malware to hack Smartphones
March 19, 2014
Mohit Kumar
I am quite sure that you must be syncing your Smartphone with your Computers for transferring files and taking backup of your device. ...
The Mask, a malware campaign that remained undetected for 7 Years
February 11, 2014
Anonymous
A Sophisticated cyber spying operation, ' The Mask ', that has been under the mask for about 7 years targeting approximately 31 countri...
BIOS Malware that can remotely destroy any computer, NSA claimed
December 16, 2013
Wang Wei
During a CBS Interview show " 60 Minutes ", The National Security Agency (NSA) officials claimed that China has developed a BIOS ...
Hacking Gmail accounts with password reset system vulnerability
November 22, 2013
Wang Wei
Oren Hafif , a security researcher has discovered a critical vulnerability in the Password reset process of Google account that allows an...
Warning: 10 Million UK Users targeted with Cryptolocker Ransomware spam email campaign
November 17, 2013
Wang Wei
The UK's National Crime Agency has given out an urgent national alert that a mass spamming event targeting 10 million UK based emai...
Japanese word processor 'Ichitaro' zero-day attack discovered in the wild
November 15, 2013
Mohit Kumar
Japanese most popular word processing software ' Ichitaro ' and Multiple Products are vulnerable to a zero day Remote Code Execu...
Cryptolocker Ransomware makes different Bitcoin wallet for each victim
October 29, 2013
Anonymous
When you're online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few...
Next Page
Exclusive Deals
Learn Ethical Hacking [Training]
Lifetime Access
99% Discount
Unlimited Secure VPN
Lifetime Access
92% Discount
Best Hacking Books [Download]
Super Bundle
95% Discount
Cisco Certifications Training
Lifetime Access
98% Discount
Stay Informed — Newsletter Sign Up
Sign up for THN newsletter and get our latest stories delivered straight to your inbox.
Email